CN110121010A - One key outgoing call implementation method, terminal, medium and electronic equipment - Google Patents

One key outgoing call implementation method, terminal, medium and electronic equipment Download PDF

Info

Publication number
CN110121010A
CN110121010A CN201910394162.0A CN201910394162A CN110121010A CN 110121010 A CN110121010 A CN 110121010A CN 201910394162 A CN201910394162 A CN 201910394162A CN 110121010 A CN110121010 A CN 110121010A
Authority
CN
China
Prior art keywords
present terminal
banquet
terminal
encrypted
attended
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910394162.0A
Other languages
Chinese (zh)
Other versions
CN110121010B (en
Inventor
谭清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Tianpeng Network Co Ltd
Original Assignee
Chongqing Tianpeng Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Tianpeng Network Co Ltd filed Critical Chongqing Tianpeng Network Co Ltd
Priority to CN201910394162.0A priority Critical patent/CN110121010B/en
Publication of CN110121010A publication Critical patent/CN110121010A/en
Application granted granted Critical
Publication of CN110121010B publication Critical patent/CN110121010B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/50Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
    • H04M3/51Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing
    • H04M3/5166Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing in combination with interactive voice response systems or voice portals, e.g. as front-ends
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/50Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers ; Centralised arrangements for recording messages
    • H04M3/51Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing
    • H04M3/523Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing with call distribution or queueing
    • H04M3/5231Centralised call answering arrangements requiring operator intervention, e.g. call or contact centers for telemarketing with call distribution or queueing with call back arrangements

Abstract

The present invention provides implementation method, terminal, medium and the electronic equipment of an a kind of key outgoing call.Wherein, which comprises send application for registration to call center services end;Obtain the application ID and applied cryptography that the server-side returns;In conjunction with present terminal and the application ID, applied cryptography, the authorization access token of the present terminal is exchanged for;The essential information that the present terminal is attended a banquet is encrypted into the authorization access token of the present terminal, the authorization access token that the present terminal is attended a banquet is obtained;External calling telephone number carries out symmetric cryptography, obtains encrypted number;It sends the encrypted number and authorization access token that the present terminal is attended a banquet is to call center services end, so that the true number of call center services end calling customer.

Description

One key outgoing call implementation method, terminal, medium and electronic equipment
Technical field
The present invention relates to field of communication technology, in particular to an a kind of key outgoing call implementation method, terminal, medium and Electronic equipment.
Background technique
Call center is a kind of place or system that centralized user service is realized based on modern communication technology.In calling The heart mostly uses greatly CTI (Computer and Telephony Integrator, computer and communication are integrated) technology, it is main It including Call Center Platform and attends a banquet, Call Center Platform mainly includes server-side.
Currently, the call center system unified based on company, each business team needs to access and carries out outgoing call demand, outside Attend a banquet during exhaling and need to repeatedly input complicated telephone number, cannot a key dial to client.
Therefore, in long-term research and development, inventor has carried out a large amount of research to a key outgoing call, proposes an a kind of key One of outgoing call implementation method, to solve the above technical problems.
Summary of the invention
The purpose of the present invention is to provide an a kind of key outgoing call implementation method, terminal, medium and electronic equipments, are able to solve At least one technical problem mentioned above.Concrete scheme is as follows:
Specific embodiment according to the present invention, in a first aspect, the present invention provides a kind of implementation method of a key outgoing call, packet It includes: sending application for registration to call center services end;Obtain the application ID and applied cryptography that the server-side returns;In conjunction with current Terminal and the application ID, applied cryptography, exchange the authorization access token of the present terminal for;The present terminal is attended a banquet Essential information is encrypted into the authorization access token of the present terminal, is obtained the authorization access that the present terminal is attended a banquet and is enabled Board;External calling telephone number carries out symmetric cryptography, obtains encrypted number;It sends the encrypted number and the present terminal is attended a banquet Authorization access token to call center services end so that the true number of call center services end calling customer.
Specific embodiment according to the present invention, second aspect, the present invention provide a kind of terminal, comprising: application sends mould Block, for sending application for registration to call center services end;Obtain module, for obtain application ID that the server-side returns and Applied cryptography;Module is exchanged for, for exchanging awarding for the present terminal in conjunction with present terminal and the application ID, applied cryptography Weigh access token;Information encrypting module, the essential information for the present terminal to be attended a banquet are encrypted to the present terminal It authorizes in access token, obtains the authorization access token that the present terminal is attended a banquet;Telephone encryption module is used for external calling telephone Number carries out symmetric cryptography, obtains encrypted number;Data transmission blocks are attended a banquet for the encrypted number and the present terminal Authorization access token to call center services end so that the true number of call center services end calling customer.
Specific embodiment according to the present invention, the third aspect, the present invention provide a kind of computer readable storage medium, On be stored with computer program, when described program is executed by processor realize as above described in any item key outgoing call realization sides Method.
Specific embodiment according to the present invention, fourth aspect, the present invention provide a kind of electronic equipment, comprising: one or Multiple processors;Storage device, for storing one or more programs, when one or more of programs are by one or more When a processor executes, so that one or more of processors realize as above described in any item key outgoing call implementation methods.
The above scheme of the embodiment of the present invention compared with prior art, attends a banquet in the present invention and no longer needs to input complicated electricity Number is talked about, and can be realized one key of seat personnel and dial into client;Encryption and decryption transmission can be carried out to original phone number, attended a banquet It cannot see that the true number of client, to protect the privacy of user;Further, the working efficiency and data of seat personnel are promoted Accuracy.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.It should be evident that the accompanying drawings in the following description is only the present invention Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.In the accompanying drawings:
Fig. 1 shows a kind of flow chart of key outgoing call implementation method according to an embodiment of the present invention;
Fig. 2 shows the method flows of the true number of call center services end according to an embodiment of the present invention calling customer Figure;
Fig. 3 shows a kind of structural schematic diagram of terminal according to an embodiment of the present invention;
Fig. 4 shows the structural schematic diagram at call center services end according to an embodiment of the present invention;
Fig. 5 shows the structural schematic diagram of the electronic equipment of embodiment according to the present invention;
Fig. 6 shows the electronic equipment attachment structure schematic diagram of embodiment according to the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into It is described in detail to one step, it is clear that described embodiments are only a part of the embodiments of the present invention, rather than whole implementation Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts All other embodiment, shall fall within the protection scope of the present invention.
The term used in embodiments of the present invention is only to be not intended to be limiting merely for for the purpose of describing particular embodiments The present invention.In the embodiment of the present invention and the "an" of singular used in the attached claims, " described " and "the" It is also intended to including most forms, unless the context clearly indicates other meaning, " a variety of " generally comprise at least two.
It should be appreciated that term "and/or" used herein is only a kind of incidence relation for describing affiliated partner, indicate There may be three kinds of relationships, for example, A and/or B, can indicate: individualism A, exist simultaneously A and B, individualism B these three Situation.In addition, character "/" herein, typicallys represent the relationship that forward-backward correlation object is a kind of "or".
It will be appreciated that though may be described in embodiments of the present invention using term first, second, third, etc.., But these ... it should not necessarily be limited by these terms.These terms be only used to by ... distinguish.For example, not departing from implementation of the present invention In the case where example range, first ... can also be referred to as second ..., and similarly, second ... can also be referred to as the One ....
Depending on context, word as used in this " if ", " if " can be construed to " ... when " or " when ... " or " in response to determination " or " in response to detection ".Similarly, context is depended on, phrase " if it is determined that " or " such as Fruit detection (condition or event of statement) " can be construed to " when determining " or " in response to determination " or " when detection (statement Condition or event) when " or " in response to detection (condition or event of statement) ".
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability Include, so that commodity or device including a series of elements not only include those elements, but also including not clear The other element listed, or further include for this commodity or the intrinsic element of device.In the feelings not limited more Under condition, the element that is limited by sentence "including a ...", it is not excluded that in the commodity or device for including the element also There are other identical elements.
Embodiment 1
Referring to Fig. 1, the embodiment of the present invention provides a kind of implementation method of a key outgoing call, this method comprises the following steps:
S1 sends application for registration to call center services end.
Specifically, multiple terminals are docked with call center respectively, and request authorization code to server-side application, work as service End can return to the request authorization code after.The terminal includes multiple operation systems, such as sale, real estate business.
S2 obtains application ID and applied cryptography that the server-side returns.
Specifically, call center issues unique application ID (App ID) and applied cryptography (App Sercet) to terminal, Namely service access side.
S3 exchanges the authorization access token of the present terminal in conjunction with present terminal and the application ID, applied cryptography.
Specifically, terminal exchanges the present terminal in conjunction with current using terminal according to the application ID, applied cryptography Authorization access token (Access Token).Which terminal the Access Token is for identifying.Terminal must be held Access Token accesses server-side, and only effective Access Token can just access server-side and subsequent tune Use interface.
The combination present terminal and the application ID, applied cryptography, exchange the authorization access token of the present terminal for, Include: to be encrypted to presently described application ID and current timestamp, generates one 20 random numbers, which is institute State the exclusive authority access token of present terminal.In the present embodiment, the Encryption Algorithm uses md5 encryption algorithm.
The essential information that the present terminal is attended a banquet is encrypted into the authorization access token of the present terminal, is obtained by S4 The authorization access token for taking the present terminal to attend a banquet.
Specifically, the essential information and the Access Token request present terminal attended a banquet by present terminal are sat The interface of seat authorization message, to obtain the authorization access token (Sns Access Token) that the present terminal is attended a banquet.Institute State Sns Access Token is mainly used for identifying which user in which client.
The computational algorithm for obtaining the authorization access token that the present terminal is attended a banquet includes: by JWT (' JSON The abbreviation of Web Token ') essential information attended a banquet to the present terminal of algorithm encrypts, and when encryption validity period is set Between, obtain the authorization access token that the present terminal is attended a banquet.The essential information that the present terminal is attended a banquet can be stepping on of attending a banquet Record account, wherein the login account includes but is not limited to work number, any user name.In the present embodiment, the encryption validity period It is 2 hours.
S5, external calling telephone number carry out symmetric cryptography, obtain encrypted number.
Specifically, terminal encrypts the telephone number of the outgoing call using symmetrical enciphering and deciphering algorithm.In the present embodiment, The applied cryptography that terminal is presented at the call center services end is set as key, the telephone number of the outgoing call is added It is close.The external calling telephone number carries out symmetric cryptography, obtains encrypted number, comprising: by symmetry algorithm by the true of outgoing call Number is encrypted with the applied cryptography, obtains corresponding encrypted characters string, which is the encrypted number.
The present terminal is using the encrypted characters string as the content of network transmission, at this point, showing in terminal page Number is to hide number, which, which can be, is hidden the centre four of true number.Assuming that symmetric cryptography is true The encrypted number that telephone number obtains is xhjaxd7123xxxcdjda2899dajhhdas, and terminal only needs showing number A click event is write in position, as long as terminal triggers the click event, the encrypted number is passed as the data of interaction between system Give call center services end.
S6, sends the encrypted number and authorization access token that the present terminal is attended a banquet is to call center services end, So that the true number of call center services end calling customer.
Specifically, the encrypted characters string and Sns Access Token that have just obtained are transferred to calling by the present terminal The outer calling function of a key is realized by the outgoing call interface in the unified outgoing call interface that center service end provides, call center services end. The true number of call center services end calling customer, comprising:
S61 decrypts the authorization access token that the present terminal is attended a banquet, and obtains the essential information that present terminal is attended a banquet;
S62 decrypts the encrypted number by symmetric encipherment algorithm, obtains the true number of outgoing call;
S63 calls the outgoing call interface of call center itself, calls the true number.
Key outgoing call implementation method provided in an embodiment of the present invention, which makes to attend a banquet, no longer needs to input complicated number, Neng Goushi Existing one key of seat personnel dials into client;In addition, encryption and decryption transmission can be carried out to original number, seat personnel is made to cannot see that visitor The true number at family, protects the privacy of user;Further, the working efficiency of seat personnel and the accuracy of data are able to ascend.
Embodiment 2
Referring to Fig. 3, the embodiment of the present invention provides a kind of terminal 300, which includes: application sending module 310, Module 320 is obtained, exchanges module 330, information encrypting module 340, telephone encryption module 350 and data transmission blocks 360 for.
The application sending module 310, for sending application for registration to call center services end.Specifically, multiple terminals It is docked respectively with call center, authorization code is requested to server-side application by the application sending module 310, works as server-side By the way that the request authorization code can be returned later.The terminal includes multiple operation systems, such as sale, real estate business.
The acquisition module 320, for obtaining the application ID and applied cryptography that the server-side returns.Specifically, calling Unique application ID (App ID) and applied cryptography (App Sercet) is issued to terminal, that is, service access side in center.Institute Stating request authorization code is application ID and applied cryptography.
It is described to exchange module 330 for, for exchanging the current end in conjunction with present terminal and the application ID, applied cryptography The authorization access token at end.Specifically, described exchange module 330 for according to the application ID, applied cryptography in conjunction with current use Terminal exchanges the authorization access token (Access Token) of the present terminal for.Which the Access Token is for identifying A terminal.The terminal must hold Access Token to access server-side, and only effective Access Token is It can be carried out access server-side, and carry out the work of subsequent calls interface.
The Processing Algorithm for exchanging module 330 for includes: to encrypt to presently described application ID and current timestamp, One 20 random numbers are generated, which is the exclusive authority access token of the present terminal.It is described in the present embodiment Encryption Algorithm uses md5 encryption algorithm.
The information encrypting module 340, the essential information for the present terminal to be attended a banquet were encrypted to the current end In the authorization access token at end, the authorization access token that the present terminal is attended a banquet is obtained.Specifically, the information encrypting module 340 essential informations attended a banquet by present terminal and the Access Token request present terminal are attended a banquet authorization message Interface, to obtain the authorization access token (Sns Access Token) that the present terminal is attended a banquet.The Sns Access Token is mainly used for identifying which user in which client.
The computational algorithm of the information encrypting module 340 includes: by JWT (' abbreviation of JSON Web Token ') algorithm The essential information attended a banquet to the present terminal encrypts, and encryption time validity period is arranged, and obtains the present terminal and sits The authorization access token of seat.The essential information that the present terminal is attended a banquet can be the login account attended a banquet, wherein the login account Number include but is not limited to work number, any user name.In the present embodiment, the encryption validity period is 2 hours.
The telephone encryption module 350 carries out symmetric cryptography for external calling telephone number, obtains encrypted number.Specifically , the telephone encryption module 350 encrypts the telephone number of the outgoing call using symmetrical enciphering and deciphering algorithm.The present embodiment In, the applied cryptography that terminal is presented at the call center services end is set as key by the telephone encryption module 350, to described The telephone number of outgoing call is encrypted.The Encryption Algorithm of the telephone encryption module 350 includes: by symmetry algorithm by outgoing call True number is encrypted with the applied cryptography, obtains corresponding encrypted characters string, which is the encryption numbers Code.
The present terminal is using the encrypted characters string as the content of network transmission, at this point, showing in terminal page Number is to hide number, which, which can be, is hidden the centre four of true number.Assuming that symmetric cryptography is true The encrypted number that telephone number obtains is xhjaxd7123xxxcdjda2899dajhhdas, and terminal only needs showing number A click event is write in position, as long as terminal triggers the click event, the encrypted number is passed as the data of interaction between system Give call center services end.
The data transmission blocks 360, the authorization access token attended a banquet for the encrypted number and the present terminal To call center services end, so that the true number of call center services end calling customer.Specifically, the data are sent Module 360 is transferred to the encrypted characters string and Sns Access Token that have just obtained the unification of call center services end offer The outer calling function of a key is realized by the outgoing call interface in outgoing call interface, call center services end.Fig. 4 show call center services The structural schematic diagram at end, the call center services end 400 include:
Information deciphering module 410, the authorization access token attended a banquet for decrypting the present terminal obtain present terminal and sit The essential information of seat;
Phone deciphering module 420 obtains true number of outgoing call for decrypting the encrypted number by symmetric encipherment algorithm Code;
Call module 430 calls the true number for calling the outgoing call interface of call center itself.
Terminal provided in an embodiment of the present invention, which makes to attend a banquet, no longer needs to input complicated number, can be realized seat personnel one Key dials into client;In addition, encryption and decryption transmission can be carried out to original number, seat personnel is made to cannot see that true number of client Code, protects the privacy of user;Further, the working efficiency of seat personnel and the accuracy of data are able to ascend.
Embodiment 3
As shown in figure 5, the equipment is used for the intelligent Matching method of property tax platform the present embodiment provides a kind of electronic equipment, The electronic equipment, comprising: at least one processor;And the memory being connect at least one described processor communication;Its In,
The memory is stored with the instruction that can be executed by one processor, and described instruction is by described at least one Manage device execute so that at least one described processor can:
Application for registration is sent to call center services end;
Obtain the application ID and applied cryptography that the server-side returns;
In conjunction with present terminal and the application ID, applied cryptography, the authorization access token of the present terminal is exchanged for;
The essential information that the present terminal is attended a banquet is encrypted into the authorization access token of the present terminal, institute is obtained State the authorization access token that present terminal is attended a banquet;
External calling telephone number carries out symmetric cryptography, obtains encrypted number;
It sends the encrypted number and authorization access token that the present terminal is attended a banquet is to call center services end, so that The true number of call center services end calling customer.
Embodiment 4
The embodiment of the present disclosure provides a kind of nonvolatile computer storage media, and the computer storage medium is stored with The key outgoing call realization side in above-mentioned any means embodiment can be performed in computer executable instructions, the computer executable instructions Method.
Embodiment 5
Below with reference to Fig. 6, it illustrates the structural representations for the electronic equipment 600 for being suitable for being used to realize the embodiment of the present disclosure Figure.Terminal device in the embodiment of the present disclosure can include but is not limited to such as mobile phone, laptop, digital broadcasting and connect Receive device, PDA (personal digital assistant), PAD (tablet computer), PMP (portable media player), car-mounted terminal (such as vehicle Carry navigation terminal) etc. mobile terminal and such as number TV, desktop computer etc. fixed terminal.Electricity shown in Fig. 6 Sub- equipment is only an example, should not function to the embodiment of the present disclosure and use scope bring any restrictions.
As shown in fig. 6, electronic equipment 600 may include processing unit (such as central processing unit, graphics processor etc.) 601, random access can be loaded into according to the program being stored in read-only memory (ROM) 602 or from storage device 608 Program in memory (RAM) 603 and execute various movements appropriate and processing.In RAM 603, it is also stored with electronic equipment Various programs and data needed for 600 operations.Processing unit 601, ROM 602 and RAM 603 pass through the phase each other of bus 604 Even.Input/output (I/O) interface 605 is also connected to bus 604.
In general, following device can connect to I/O interface 605: including such as touch screen, touch tablet, keyboard, mouse, taking the photograph As the input unit 606 of head, microphone, accelerometer, gyroscope etc.;Including such as liquid crystal display (LCD), loudspeaker, vibration The output device 607 of dynamic device etc.;Storage device 608 including such as tape, hard disk etc.;And communication device 609.Communication device 609, which can permit electronic equipment 600, is wirelessly or non-wirelessly communicated with other equipment to exchange data.Although Fig. 6 shows tool There is the electronic equipment 600 of various devices, it should be understood that being not required for implementing or having all devices shown.It can be with Alternatively implement or have more or fewer devices.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium On computer program, which includes the program code for method shown in execution flow chart.In such reality It applies in example, which can be downloaded and installed from network by communication device 609, or from storage device 608 It is mounted, or is mounted from ROM 602.When the computer program is executed by processing unit 601, the embodiment of the present disclosure is executed Method in the above-mentioned function that limits.
It should be noted that the above-mentioned computer-readable medium of the disclosure can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can be it is any include or storage journey The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this In open, computer-readable signal media may include in a base band or as the data-signal that carrier wave a part is propagated, In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable and deposit Any computer-readable medium other than storage media, the computer-readable signal media can send, propagate or transmit and be used for By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to: electric wire, optical cable, RF (radio frequency) etc. are above-mentioned Any appropriate combination.
Above-mentioned computer-readable medium can be included in above-mentioned electronic equipment;It is also possible to individualism, and not It is fitted into the electronic equipment.
The calculating of the operation for executing the disclosure can be write with one or more programming languages or combinations thereof Machine program code, above procedure design language include object oriented program language-such as Java, Smalltalk, C+ +, it further include conventional procedural programming language-such as " C " language or similar programming language.Program code can Fully to execute, partly execute on the user computer on the user computer, be executed as an independent software package, Part executes on the remote computer or executes on a remote computer or server completely on the user computer for part. In situations involving remote computers, remote computer can pass through the network of any kind --- including local area network (LAN) Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service Provider is connected by internet).
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction Combination realize.
Being described in unit involved in the embodiment of the present disclosure can be realized by way of software, can also be by hard The mode of part is realized.Wherein, the title of unit does not constitute the restriction to the unit itself under certain conditions, for example, the One acquiring unit is also described as " obtaining the unit of at least two internet protocol addresses ".

Claims (10)

1. a kind of implementation method of a key outgoing call characterized by comprising
Application for registration is sent to call center services end;
Obtain the application ID and applied cryptography that the server-side returns;
In conjunction with present terminal and the application ID, applied cryptography, the authorization access token of the present terminal is exchanged for;
The essential information that the present terminal is attended a banquet is encrypted into the authorization access token of the present terminal, is worked as described in acquisition The authorization access token that preceding terminal is attended a banquet;
External calling telephone number carries out symmetric cryptography, obtains encrypted number;
It sends the encrypted number and authorization access token that the present terminal is attended a banquet is to call center services end, so that described The true number of call center services end calling customer.
2. the method according to claim 1, wherein the combination present terminal with the application ID, using close Code, exchanges the authorization access token of the present terminal for, comprising:
Presently described application ID and current timestamp are encrypted, generate one 20 random numbers, which is institute State the exclusive authority access token of present terminal.
3. according to the method described in claim 2, it is characterized in that, the Encryption Algorithm uses md5 encryption algorithm.
4. the method according to claim 1, wherein the authorization access order for obtaining the present terminal and attending a banquet The computational algorithm of board includes:
It is encrypted by the essential information that JWT algorithm attends a banquet to the present terminal, and encryption time validity period is set, obtained The authorization access token that the present terminal is attended a banquet.
5. being obtained the method according to claim 1, wherein the external calling telephone number carries out symmetric cryptography Encrypted number, comprising:
The true number of outgoing call is encrypted with the applied cryptography by symmetry algorithm, obtains corresponding encrypted characters string, The encrypted characters string is the encrypted number.
6. the method according to claim 1, wherein true number of call center services end calling customer Code, comprising:
The authorization access token that the present terminal is attended a banquet is decrypted, the essential information that present terminal is attended a banquet is obtained;
The encrypted number is decrypted by symmetric encipherment algorithm, obtains the true number of outgoing call;
The outgoing call interface of call center itself is called, the true number is called.
7. the method according to claim 1, wherein the essential information that the present terminal is attended a banquet includes attending a banquet Login account.
8. a kind of terminal characterized by comprising
Apply for sending module, for sending application for registration to call center services end;
Module is obtained, for obtaining the application ID and applied cryptography that the server-side returns;
Module is exchanged for, for exchanging the authorization access of the present terminal in conjunction with present terminal and the application ID, applied cryptography Token;
Information encrypting module, the essential information for the present terminal to be attended a banquet are encrypted to the authorization access of the present terminal In token, the authorization access token that the present terminal is attended a banquet is obtained;
Telephone encryption module carries out symmetric cryptography for external calling telephone number, obtains encrypted number;
Data transmission blocks, authorization access token to the call center attended a banquet for the encrypted number and the present terminal take Business end, so that the true number of call center services end calling customer.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that described program is by processor The method as described in any one of claims 1 to 7 is realized when execution.
10. a kind of electronic equipment characterized by comprising
One or more processors;
Storage device, for storing one or more programs, when one or more of programs are by one or more of processing When device executes, so that one or more of processors realize the method as described in any one of claims 1 to 7.
CN201910394162.0A 2019-05-13 2019-05-13 One-key outbound realization method, terminal, medium and electronic equipment Active CN110121010B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910394162.0A CN110121010B (en) 2019-05-13 2019-05-13 One-key outbound realization method, terminal, medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910394162.0A CN110121010B (en) 2019-05-13 2019-05-13 One-key outbound realization method, terminal, medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN110121010A true CN110121010A (en) 2019-08-13
CN110121010B CN110121010B (en) 2020-05-15

Family

ID=67522258

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910394162.0A Active CN110121010B (en) 2019-05-13 2019-05-13 One-key outbound realization method, terminal, medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN110121010B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113923306A (en) * 2021-10-13 2022-01-11 上海淇馥信息技术有限公司 Internet online voice communication method and device and electronic equipment
EP4332813A1 (en) 2022-09-01 2024-03-06 Manifone Method for preserving privacy of telephone numbers used for telephone prospecting campaigns

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101163014A (en) * 2007-11-30 2008-04-16 中国电信股份有限公司 Dynamic password identification authenticating system and method
CN101257664A (en) * 2007-02-28 2008-09-03 株式会社日立制作所 Call controlling equipment and call controlling method
CN102984329A (en) * 2012-09-26 2013-03-20 任峰 Calling method of demanding callback and automatic off-hook through data network for smart phone
CN103067169A (en) * 2011-12-01 2013-04-24 微软公司 Application licensing authentication
CN103246989A (en) * 2013-05-13 2013-08-14 上海言海网络信息技术有限公司 Cloud-computing-based crazy telesale system
CN103685177A (en) * 2012-09-12 2014-03-26 中国移动通信集团四川有限公司 Method, device and system for processing IMS (Ip Multimedia Subsystem) network call
CN104468518A (en) * 2014-11-10 2015-03-25 腾讯科技(深圳)有限公司 Service management method, device and system
US9197746B2 (en) * 2008-02-05 2015-11-24 Avaya Inc. System, method and apparatus for authenticating calls
CN106603876A (en) * 2016-11-10 2017-04-26 河南智业科技发展有限公司 Cloud service based calling system
CN106982305A (en) * 2017-03-23 2017-07-25 青岛融贯汇众软件有限公司 A kind of method of calling based on Call Center Platform
CN107690040A (en) * 2017-05-25 2018-02-13 上海爱优威软件开发有限公司 Automatic dial method
CN208445636U (en) * 2018-07-04 2019-01-29 中通天鸿(北京)通信科技股份有限公司 A kind of call platform device
CN109688279A (en) * 2018-08-31 2019-04-26 平安科技(深圳)有限公司 Traffic handling method, apparatus, equipment and computer readable storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101257664A (en) * 2007-02-28 2008-09-03 株式会社日立制作所 Call controlling equipment and call controlling method
CN101163014A (en) * 2007-11-30 2008-04-16 中国电信股份有限公司 Dynamic password identification authenticating system and method
US9197746B2 (en) * 2008-02-05 2015-11-24 Avaya Inc. System, method and apparatus for authenticating calls
CN103067169A (en) * 2011-12-01 2013-04-24 微软公司 Application licensing authentication
CN103685177A (en) * 2012-09-12 2014-03-26 中国移动通信集团四川有限公司 Method, device and system for processing IMS (Ip Multimedia Subsystem) network call
CN102984329A (en) * 2012-09-26 2013-03-20 任峰 Calling method of demanding callback and automatic off-hook through data network for smart phone
CN103246989A (en) * 2013-05-13 2013-08-14 上海言海网络信息技术有限公司 Cloud-computing-based crazy telesale system
CN104468518A (en) * 2014-11-10 2015-03-25 腾讯科技(深圳)有限公司 Service management method, device and system
CN106603876A (en) * 2016-11-10 2017-04-26 河南智业科技发展有限公司 Cloud service based calling system
CN106982305A (en) * 2017-03-23 2017-07-25 青岛融贯汇众软件有限公司 A kind of method of calling based on Call Center Platform
CN107690040A (en) * 2017-05-25 2018-02-13 上海爱优威软件开发有限公司 Automatic dial method
CN208445636U (en) * 2018-07-04 2019-01-29 中通天鸿(北京)通信科技股份有限公司 A kind of call platform device
CN109688279A (en) * 2018-08-31 2019-04-26 平安科技(深圳)有限公司 Traffic handling method, apparatus, equipment and computer readable storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113923306A (en) * 2021-10-13 2022-01-11 上海淇馥信息技术有限公司 Internet online voice communication method and device and electronic equipment
CN113923306B (en) * 2021-10-13 2023-10-20 上海淇馥信息技术有限公司 Internet online voice communication method and device and electronic equipment
EP4332813A1 (en) 2022-09-01 2024-03-06 Manifone Method for preserving privacy of telephone numbers used for telephone prospecting campaigns

Also Published As

Publication number Publication date
CN110121010B (en) 2020-05-15

Similar Documents

Publication Publication Date Title
US11520912B2 (en) Methods, media, apparatuses and computing devices of user data authorization based on blockchain
CN110245510A (en) Method and apparatus for predictive information
US10587591B2 (en) Generating a password
CN113228011A (en) Data sharing
CN109241181A (en) Database operation method and device
CN109255210A (en) The method, apparatus and storage medium of intelligent contract are provided in block chain network
CN110084034A (en) A kind of cipher set-up method, storage medium and electronic equipment based on weak passwurd detection
CN112287372A (en) Method and apparatus for protecting clipboard privacy
CN110535659A (en) Method and apparatus for handling request of data
CN110263565A (en) Method and apparatus for calling service
EP4350556A1 (en) Information verification method and apparatus
CN112039826A (en) Login method and device applied to applet terminal
US20180255004A1 (en) Systems and methods for providing requested user information to a validated user
CN110121010A (en) One key outgoing call implementation method, terminal, medium and electronic equipment
CN113609781A (en) Automobile production mold optimization method, system, equipment and medium based on federal learning
CN112487451A (en) Display method and device and electronic equipment
CN111291396A (en) Form data processing method and device, electronic equipment and storage medium
US20200145200A1 (en) Attribute-based key management system
CN111767550A (en) Data storage method and device
CN109981446A (en) Information generating method, electronic equipment and computer-readable medium
CN108737402A (en) Mobile terminal safety means of defence and device
US9667655B2 (en) Intelligent content ghosting on mobile devices
US20120101829A1 (en) Wholesale device registration system, method, and program product
CN109725951A (en) Control method, system, electronic equipment and computer-readable medium
CN110492998A (en) The method of encryption and decryption data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant